You are here

Cybersecurity

Security Awareness – Poor Configurations to Blame for Large Percentage of Ransomware

A new report from Microsoft analyzes the evolving nature of the ransomware business into a ransomware as a service (RaaS) model and offers important lessons and recommendations for network defenders. The most notable finding, among others, is that over 80 percent of ransomware attacks can be traced to common configuration errors in software and devices. The RaaS model lowers the barrier to entry and obfuscates the identity of the attackers behind the ransomware.

FBI PIN - Proxies and Configurations Used for Credential Stuffing Attacks on Online Customer Accounts

The FBI has published a TLP:WHITE Private Industry Notification (PIN) warning that cyber criminals are leveraging proxies and configurations to mask and automate credential stuffing attacks on online customer accounts of U.S. businesses. These attacks, if successful, can lead to financial losses associated with fraudulent purchases, customers being notified, system downtime and remediation, and reputational cost.

Threat Advisory – Current Phishing Campaign Mimics a Primacy Agency Data Validation Request

by Andrew Hildick-Smith

Attention: If the EPA or your primacy agency asks you to validate your basic Public Water Supply (PWS) system information, look extremely closely to the email and validate/verify the request is legitimate BEFORE you respond. Please view the attachment for screenshots of the actual phishing messages so you can spot and report similar scams.

What Happened?

Threat Awareness - DarkTortilla Malware

Security researchers are warning defenders to be aware of ‘DarkTortilla’ which several threat actors are using to deliver a wide range of information stealers, remote-access Trojans (RATs), and other malicious payloads. DarkTortilla was first observed by researchers in October 2021, but they believe it has been active since at least 2015. Similar to other malware, threat actors are distributing DarkTortilla via spam emails with file attachments such as .ISO, .ZIP, and .IMG. In some instances, they have also used malicious documents to deliver the malware.

OT/ICS Security – USB Storage Devices are Still a Universal Threat to Industrial Operations

USBs, those innocuous looking little portable storage devices, while useful in utility are still dangerous for utilities. These devices that are practical for transferring legitimate files and documents are equally functional for transferring malware into and out of production OT/ICS networks – including air-gapped environments. In the Honeywell Industrial Cybersecurity: USB Threat Report 2022, Honeywell’s Cybersecurity Global Analysis, Research, and Defense (GARD) team once again looked at the increasing threat caused by these modest devices.

Cyber Preparedness – Cyber Insurance Considerations

A new study from BlackBerry and Corvus Insurance examines the state of cyber insurance and offers recommendations for helping close the gaps in coverage affecting organizations of all sizes. The study revealed many concerning gaps in cyber insurance. Only around one fifth of all businesses surveyed have cyber insurance coverage above the median ransomware demand of $600,000. Relatedly, among small and medium businesses (SMBs) with fewer than 1,500 employees, only fourteen percent have coverage limits above $600,000.

Ransomware Resilience – Preparing for Attacks Like They’re Natural Disasters

Ransomware attacks continue to be one of the most pernicious cyber threats organizations face today. A survey from the group CISOs Connect found that almost a quarter of all surveyed companies were impacted by ransomware attacks on more than one occasion. Consequently, some security researchers recommend conceptualizing ransomware defense on FEMA’s four phases of emergency management: mitigation, preparedness, response, and recovery.

Pages

Subscribe to Cybersecurity